🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Disk Forensics

MBR Analysis, File Carving, Timeline Reconstruction, Deleted File Recovery

FBI used bitcoin wallet records to peg notorious IntelBroker as UK national
theregister.comΒ·13h
πŸ”“Hacking
Design and Usage of the Human-Machine Interfaces (HMI) for a Land-Based Railway Cyber Range
pixelstech.netΒ·7h
πŸ–₯️Modern Terminals
ZFS in Virtualization: Storage Backend for the Pros
klarasystems.comΒ·1d
πŸ’ΏZFS Internals
Testing in Production
blog.scottlogic.comΒ·1d
πŸ‘οΈSystem Observability
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.orgΒ·1d
🎯Threat Hunting
The AI Arms Race: When Attackers Leverage Cutting-Edge Tech
blog.checkpoint.comΒ·19h
πŸ•΅οΈVector Smuggling
How to Migrate a Large Proxmox Virtual Machine to another Host
homeserverguides.comΒ·1dΒ·
Discuss: r/homelab
πŸ’ΎProxmox Storage
Voxkryptia: A Conceptual Framework for Advanced Database Security
dev.toΒ·1dΒ·
Discuss: DEV
🧬PostgreSQL Forensics
Adaptive Hybrid Sort: Dynamic Strategy Selection for Optimal Sorting Across Diverse Data Distributions
arxiv.orgΒ·4h
🌳Trie Structures
Kafka Fundamentals: kafka retention.ms
dev.toΒ·1dΒ·
Discuss: DEV
🌊Streaming Systems
New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compaction
aws.amazon.comΒ·2d
πŸ”„Burrows-Wheeler
How to Effortlessly Clean and Manage Disk Space on Linux Servers with One Script
dev.toΒ·2dΒ·
Discuss: DEV
🐚Shell Automation
Show HN: Blockdiff – How we built our own file format for VM disk snapshots
cognition.aiΒ·3dΒ·
Discuss: Lobsters, Hacker News
πŸ’ΏZFS Internals
5 huge stumbling blocks to legacy mainframe EOL
techradar.comΒ·2d
πŸ›οΈMainframe Archaeology
Distilling Normalizing Flows
arxiv.orgΒ·4h
πŸ“₯Feed Aggregation
Using LLMs in CI/CD for semantic testing of web content
plo.ugΒ·18hΒ·
Discuss: Hacker News
⚑Proof Automation
ZFS in Virtualization: Storage Backend for the Pros
discoverbsd.comΒ·1d
πŸ’ΏZFS Internals
Unveiling Insights: 18 Essential Resources for Exploratory Data Analysis (EDA)
dev.toΒ·2dΒ·
Discuss: DEV
⛏️Archive Mining
Out-of-Band, Part 1: The new generation of IP KVMs and how to find them
runzero.comΒ·19hΒ·
Discuss: Hacker News
πŸ•ΈοΈWASM Archives
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·2d
πŸ”NTLM Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap